In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
This document discusses different techniques for digital image watermarking, including in the spatial and frequency domains. It provides an overview of watermarking concepts and applications. It then describes two watermarking algorithms - one that embeds watermarks in the spatial domain by modifying pixel intensities in selected image blocks, and another that embeds watermarks in the wavelet domain by modifying selected wavelet coefficients. Both algorithms are described step-by-step and include watermark insertion and extraction procedures. Results are provided showing the performance of the algorithms under different attacks in terms of normalized cross-correlation between the original and extracted watermarks.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
This document proposes a robust digital image watermarking technique based on spread spectrum and convolutional coding. The watermark is first encoded using a convolutional encoder to improve robustness. It is then spread over the image using CDMA spread spectrum. During extraction, the watermark bits are decoded using a Viterbi algorithm decoder. Simulation results show the proposed method effectively resists common attacks like JPEG compression, noise, cropping and rotation. It performs better than directly embedding the watermark without convolutional coding, achieving higher PSNR values and correlation coefficients against various attacks.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICpriyanka singh
The document summarizes a research paper on embedding a secret watermark image into a QR code image using wavelet transform. It discusses converting a binary logo image into a watermark and inserting it into a selected sub-band of the QR code after decomposing the image using two-level two-dimensional wavelet transform. The watermark can then be extracted from the watermarked QR code without needing the original image by using the predicted values and secret key to determine the embedded bit. Previous digital watermarking techniques are also briefly reviewed, including spatial and frequency domain methods.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses different techniques for digital image watermarking, including in the spatial and frequency domains. It provides an overview of watermarking concepts and applications. It then describes two watermarking algorithms - one that embeds watermarks in the spatial domain by modifying pixel intensities in selected image blocks, and another that embeds watermarks in the wavelet domain by modifying selected wavelet coefficients. Both algorithms are described step-by-step and include watermark insertion and extraction procedures. Results are provided showing the performance of the algorithms under different attacks in terms of normalized cross-correlation between the original and extracted watermarks.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
This document proposes a robust digital image watermarking technique based on spread spectrum and convolutional coding. The watermark is first encoded using a convolutional encoder to improve robustness. It is then spread over the image using CDMA spread spectrum. During extraction, the watermark bits are decoded using a Viterbi algorithm decoder. Simulation results show the proposed method effectively resists common attacks like JPEG compression, noise, cropping and rotation. It performs better than directly embedding the watermark without convolutional coding, achieving higher PSNR values and correlation coefficients against various attacks.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICpriyanka singh
The document summarizes a research paper on embedding a secret watermark image into a QR code image using wavelet transform. It discusses converting a binary logo image into a watermark and inserting it into a selected sub-band of the QR code after decomposing the image using two-level two-dimensional wavelet transform. The watermark can then be extracted from the watermarked QR code without needing the original image by using the predicted values and secret key to determine the embedded bit. Previous digital watermarking techniques are also briefly reviewed, including spatial and frequency domain methods.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a proposed CDMA-based watermarking scheme that aims to improve robustness and message capacity. It begins with an overview of digital watermarking phases and concepts. It then discusses applying CDMA techniques to watermarking, modeling video as a bit plane stream, defining the watermark and spreading it using m-sequences. The watermark is inserted into video bit planes determined by a pseudorandom sequence. Experimental results showed the proposed scheme has higher robustness than conventional approaches under different attacks. Wavelet transforms and their use in watermark extraction are also briefly covered.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
This document provides an overview of digital watermarking techniques. It discusses how watermarking has evolved from earlier steganography methods and classifications of watermarking such as image, audio, and video watermarking. It also summarizes various watermarking techniques including spatial domain methods that directly modify pixel values, frequency domain methods that operate in transform domains like DCT and DWT, and spread spectrum techniques. Specific spatial and frequency domain techniques are described for image, audio, and video watermarking. The document concludes that watermarking continues to be an evolving topic with opportunities remaining to further develop fragile and semi-fragile techniques.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
The proposed system implements an image watermarking technique that incorporates human visual system (HVS) models into watermark embedding. The watermarking is performed in the wavelet domain. The algorithm first calculates the coarseness of different subbands (HH, HL, LH) to select the subband with the highest coarseness for watermark embedding. It then embeds the watermark bits into the selected subband by modifying the least significant bits of coefficients based on their values. Experimental results on test images show the technique is robust, with average watermark extraction rates of 80-95% and high PSNR values, even after filtering.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a digital video watermarking technique using discrete cosine transform (DCT) and perceptual analysis. It proposes embedding a binary watermark in the DCT domain of video frames. A mathematical model is developed to insert a visible watermark into video frames in the DCT domain while considering characteristics of the human visual system to minimize perceptual quality impact. Experimental results show a watermarked video frame with the watermark logo embedded at different positions. The technique aims to provide copyright protection for digital video applications.
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
Digital watermark technology hides copyright information in digital images, effectively protecting the
copyright of digital images. At present, the color image digital watermarking algorithm still has defects
such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the
above problems, this paper studies the digital watermarking method based on discrete wavelet transform
and discrete cosine transform. Then this paper proposes a color image blind digital watermarking
algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y
component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and
perform the discrete cosine transform. finally, use the embedding method to convert the watermark
information after the Arnold transform embedded in the block. The experimental results show that the
PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being
attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm
has good robustness and can achieve watermarking blind extraction.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
This document summarizes a research paper on visual cryptography, which is a technique that allows information like images and text to be encrypted in a way that can be decrypted by the human visual system without using computers. It discusses how visual cryptography works by splitting a secret image into random shares, such that overlaying the shares reveals the original secret image. The document then describes the specific SDS algorithm used in the paper for keyless image encryption by sieving, dividing, and shuffling the image pixels into multiple random shares. It concludes by discussing potential applications and areas for further research on visual cryptography.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
Abstract
Due to increase in growth of internet users of networks are increasing rapidly. Owners of the digital products are concerned about illegal copying of their products. Security and copyright protection are becoming important issues in multimedia applications and services. Digital watermarking is a technology used for copyright protection of digital media. Here ownership information data called watermark is embedded into the digital media without affecting its perceptual quality. In case of any dispute, the watermark data can be detected or extracted from the media and use as a proof of ownership. Digital video watermarking scheme based on Discrete Wavelet Transform is addressed in this paper. Design of this scheme using Matlab Simulink is proposed. Embedded watermark is robust against various attacks that can be carried out on the watermarked video. Index Terms:Digital video, Discrete Wavelet Transform, Binary watermark.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
International Journal for Research in Applied Science & Engineeringpriyanka singh
This document describes a method for embedding a secret watermark image into a QR code image using discrete wavelet transform. The watermark embedding process involves:
1) Performing a two-level discrete wavelet transform on the QR code image to create sub-bands
2) Converting the watermark image (e.g. a logo) to a binary sequence and generating a pseudo-random sequence with a secret key
3) Embedding the watermark bits into one of the high frequency sub-bands by modifying pixel values
4) Performing inverse discrete wavelet transform to get the watermarked QR code image
The watermark can then be extracted without the original QR code by estimating the original pixel values and
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a proposed CDMA-based watermarking scheme that aims to improve robustness and message capacity. It begins with an overview of digital watermarking phases and concepts. It then discusses applying CDMA techniques to watermarking, modeling video as a bit plane stream, defining the watermark and spreading it using m-sequences. The watermark is inserted into video bit planes determined by a pseudorandom sequence. Experimental results showed the proposed scheme has higher robustness than conventional approaches under different attacks. Wavelet transforms and their use in watermark extraction are also briefly covered.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
This document provides an overview of digital watermarking techniques. It discusses how watermarking has evolved from earlier steganography methods and classifications of watermarking such as image, audio, and video watermarking. It also summarizes various watermarking techniques including spatial domain methods that directly modify pixel values, frequency domain methods that operate in transform domains like DCT and DWT, and spread spectrum techniques. Specific spatial and frequency domain techniques are described for image, audio, and video watermarking. The document concludes that watermarking continues to be an evolving topic with opportunities remaining to further develop fragile and semi-fragile techniques.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
The proposed system implements an image watermarking technique that incorporates human visual system (HVS) models into watermark embedding. The watermarking is performed in the wavelet domain. The algorithm first calculates the coarseness of different subbands (HH, HL, LH) to select the subband with the highest coarseness for watermark embedding. It then embeds the watermark bits into the selected subband by modifying the least significant bits of coefficients based on their values. Experimental results on test images show the technique is robust, with average watermark extraction rates of 80-95% and high PSNR values, even after filtering.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a digital video watermarking technique using discrete cosine transform (DCT) and perceptual analysis. It proposes embedding a binary watermark in the DCT domain of video frames. A mathematical model is developed to insert a visible watermark into video frames in the DCT domain while considering characteristics of the human visual system to minimize perceptual quality impact. Experimental results show a watermarked video frame with the watermark logo embedded at different positions. The technique aims to provide copyright protection for digital video applications.
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
Digital watermark technology hides copyright information in digital images, effectively protecting the
copyright of digital images. At present, the color image digital watermarking algorithm still has defects
such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the
above problems, this paper studies the digital watermarking method based on discrete wavelet transform
and discrete cosine transform. Then this paper proposes a color image blind digital watermarking
algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y
component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and
perform the discrete cosine transform. finally, use the embedding method to convert the watermark
information after the Arnold transform embedded in the block. The experimental results show that the
PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being
attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm
has good robustness and can achieve watermarking blind extraction.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
This document summarizes a research paper on visual cryptography, which is a technique that allows information like images and text to be encrypted in a way that can be decrypted by the human visual system without using computers. It discusses how visual cryptography works by splitting a secret image into random shares, such that overlaying the shares reveals the original secret image. The document then describes the specific SDS algorithm used in the paper for keyless image encryption by sieving, dividing, and shuffling the image pixels into multiple random shares. It concludes by discussing potential applications and areas for further research on visual cryptography.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
Abstract
Due to increase in growth of internet users of networks are increasing rapidly. Owners of the digital products are concerned about illegal copying of their products. Security and copyright protection are becoming important issues in multimedia applications and services. Digital watermarking is a technology used for copyright protection of digital media. Here ownership information data called watermark is embedded into the digital media without affecting its perceptual quality. In case of any dispute, the watermark data can be detected or extracted from the media and use as a proof of ownership. Digital video watermarking scheme based on Discrete Wavelet Transform is addressed in this paper. Design of this scheme using Matlab Simulink is proposed. Embedded watermark is robust against various attacks that can be carried out on the watermarked video. Index Terms:Digital video, Discrete Wavelet Transform, Binary watermark.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
International Journal for Research in Applied Science & Engineeringpriyanka singh
This document describes a method for embedding a secret watermark image into a QR code image using discrete wavelet transform. The watermark embedding process involves:
1) Performing a two-level discrete wavelet transform on the QR code image to create sub-bands
2) Converting the watermark image (e.g. a logo) to a binary sequence and generating a pseudo-random sequence with a secret key
3) Embedding the watermark bits into one of the high frequency sub-bands by modifying pixel values
4) Performing inverse discrete wavelet transform to get the watermarked QR code image
The watermark can then be extracted without the original QR code by estimating the original pixel values and
The document summarizes a 1-level discrete wavelet transform (DWT) image watermarking algorithm for embedding watermarks into RGB cover images. The algorithm applies 1-level DWT to decompose the RGB cover image and watermark into frequency subbands. It then inserts the watermark into the low-frequency approximation subband of the cover image using alpha blending. The watermarked image achieves good quality with high peak signal-to-noise ratio. The extracted watermark matches the original with a normalized correlation value close to 1, showing the algorithm efficiently detects the watermark. The algorithm is imperceptible and robust against various attacks like noise and filtering.
The document describes a video watermarking scheme based on discrete wavelet transform (DWT) and principal component analysis (PCA) for copyright protection. The scheme embeds a binary logo watermark into video frames by applying DWT to decompose frames into sub-bands, then applying block-based PCA on sub-blocks of low and high frequency sub-bands. The watermark is embedded into the principal components of the sub-blocks. Algorithms are provided for applying DWT, PCA transforms, and embedding and extracting the watermark. The scheme aims to provide imperceptibility, robustness against attacks, and ownership protection for digital video content.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
The document describes a technique for watermarking grayscale images using the least significant bit (LSB) method. It begins with an abstract that introduces digital watermarking and LSB watermarking. It then provides more details on the LSB algorithm and how it embeds a watermark by replacing the LSB of selected image pixels. The paper tests the technique on various images, embedding the watermark in different bit positions. It calculates the mean squared error and peak signal-to-noise ratio for the watermarked images. Finally, it applies different noise attacks to the watermarked images and measures the effect on quality.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
This document presents a hybrid DWT-SVD method for digital video watermarking using random frame selection. The proposed method embeds a watermark into randomly selected video frames by applying discrete wavelet transform and singular value decomposition. The blue channel of selected frames is used for watermark embedding in the mid-frequency DWT coefficients. Experimental results show the method provides good imperceptibility and robustness against various attacks like compression, cropping, noise addition, contrast changes and tampering. The normalization coefficient between original and extracted watermarks is used to evaluate the performance under different attacks.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
This document summarizes a student project on reversible data hiding techniques. The project compares different reversible watermarking methods and proposes a new technique that embeds a secret bitstream into a color image using bisection and square root interpolation. Experimental results showed the embedded and extracted bitstreams had a correlation of 1, indicating no data loss. Future work could improve the algorithm security by using multiple color planes and transformations for watermarking.
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
This paper proposes a novel digital video watermarking technique that embeds both visible and invisible watermarks for improved copyright protection. The invisible watermark is embedded using discrete wavelet transform (DWT) in the high-high (HH) subband coefficients of video frames. The visible watermark is embedded partially in video frames depending on user input location. Experimental results on a gray-scale video show the embedded watermarks can be extracted after attacks like salt and pepper noise, Gaussian noise, and median filtering, with peak signal-to-noise ratios above 28 dB, demonstrating the technique's robustness.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
In this paper, a new robust watermarking technique for copyright protection based on Discrete
Wavelet Transform and Singular Value Decomposition is proposed. The high frequency subband
of the wavelet decomposed cover image is modified by modifying its singular values. A secret key
is generated from the original watermark with the help of visual cryptography to claim the
ownership of the image. The ownership of the image can be claimed by superimposing this secret
key on the extracted watermark from the watermarked image. The robustness of the technique is
tested by applying different attacks and the visual quality of the extracted watermark after
applying these attacks is good. Also, the visual quality of the watermarked image is undistinguishable from the original image.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection (20)
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection
1. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
DOI : 10.5121/sipij.2010.1204 33
A DWT based Dual Image Watermarking
Technique for Authenticity and Watermark
Protection
Shikha Tripathi1
, Nishanth Ramesh2
, Bernito A3
, Neeraj K J4
1
Dept. of Electronics & Communication Engineering, Amrita Vishwa Vidyapeetham,
School of Engineering, Bangalore, India.
shikha.eee@gmail.com
2
Programmer Analyst Trainee, Cognizant Technology Solutions, Coimbatore, India.
nishanthr3105@gmail.com
3
Bernito A, Graduate student, Remote Sensing, Department of Civil Engineering,
Anna University, Tirunelveli, India.
bernitoxavier@gmail.com
4
Programmer Analyst Trainee, Cognizant Technology Solutions, Bangalore, India.
nkj.neeraj@gmail.com
Abstract
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind
algorithms are used for the copyright protection of the cover/host image and the watermark respectively.
We use the concept of embedding two watermarks into the cover image by actually embedding only one, to
authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the
primary watermark (logo) are modified using another smaller secondary binary image (sign) and the mid-
frequency coefficients of the cover/host image. Since the watermark has some features of host image
embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or
copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has
been developed and used successfully in various stages of the algorithm. We have also proposed a new
approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the
cover image. In all the existing techniques the randomness is incorporated in selecting the location to
embed the watermark. This makes the embedding process more unpredictable. The cover image which is
watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG
compression, scaling and noising. From the results it has been found that it is very robust and has good
invisibility as well.
Keywords
Dual Watermark; Discrete Wavelet Transform (DWT), Signed-Logo; Peak Signal to Noise Ratio (PSNR);
Mean Square Error (MSE).
1. INTRODUCTION
The proliferation of digitized media due to the rapid growth of networked multimedia systems has
created an urgent need for copyright enforcement technologies that can protect copyright
ownership of multimedia objects. Digital rights management (DRM) is a generic term for access
control technologies that can be used by hardware manufacturers, publishers, copyright holders
and individuals to impose limitations on the usage of digital content and devices. The term is used
2. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
34
to describe any technology that inhibits use of digital content not desired or intended by the
content provider. Over the past few years the technology of digital watermarking has emerged as
a leading candidate that can solve the fundamental problem of legal ownership [1]. Applications
include copyright protection, authentication and data hiding. Though watermarking is generally
used to protect copyright of digital content, it is now finding use in other kinds of media like
printed materials, texture images, designs, copy machines, scanners and other applications where
copyright protection is required. Various watermarking schemes have been developed which
embed the watermark either in spatial or in the transform domain [2]-[4].
The concept of dual watermarking, wherein, two watermarks are embedded instead of one for
increased protection and security has been proposed earlier in both spatial and transform domains
[5]-[8], [15]-[22]. In this paper, Discrete Wavelet Transform (DWT) domain is used and the
watermark is embedded in the mid-frequency region, in order to achieve perceptual invisibility as
well as robustness to attacks [9].
A new concept of embedding two watermarks into the cover image by actually embedding only
one is introduced here, wherein features from the host image as well as the secondary watermark
are used. This is carried out by modifying the DWT coefficients of the primary watermark (a
grayscale logo/image) based on another meaningful secondary binary image (the sign) and some
statistical features of the cover image, prior to embedding into the cover image. The sign is
virtually embedded into the cover image through the logo i.e. the signed-logo is embedded into
the cover image.
A new approach for embedding is proposed, wherein, the watermark pixels are chosen pseudo-
randomly, besides pseudo-randomly selecting the locations for embedding the watermark in the
mid-frequency region of the source image. This increases the security two-fold. The highlight of
the process is that we incorporate both blind and non-blind methods into one watermarking
scheme i.e. the sign is embedded into the logo in a non-blind fashion to create a signed-logo
which is then embedded into the cover image in a blind fashion. Thus we achieve a two-level
security by actually using only one watermark. Moreover in any watermarking scheme, the
watermark is also an official property of the embedding authority. The concept of signing the
watermark rules out any possibility of malicious use of the watermark. The original logo is
available only to the authentic receivers. The standard deviation of the second level and first level
mid-frequency coefficients of the cover image are used in both blind and non-blind methods
respectively [10]-[11].
To further increase the security a pseudo random number generator (PRNG) is used at various
instances in the algorithm. This reduces the chances of watermark extraction by prediction. We
have developed a PRNG based on the universal constant π [12].
The proposed watermarking scheme can be made intelligent by adding an adaptive fuzzy logic
interface to judge the strength of watermark and optimize the watermark embedding process
which forms the future scope of this work.
The rest of the paper is organized as follows. Section 2 describes the pseudo-random number
generator and Section 3 describes the non-blind embedding algorithm. Section 4 discusses blind
embedding algorithm. In Section 5 we explain the watermark extraction operation. In Section 6
we present the experimental results and conclude in Section 7.
3. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
35
1. PSEUDO RANDOM GENERATOR
A pseudo random generator based on π is proposed and used in the embedding and extraction
process. The value of π is known to be a series of continuous and random numbers occurring in a
non-repetitive fashion. This pseudo random generator is used in determining the subblock
locations and also in selecting the pixel values of the watermark which are to be
embedded/extracted. The random number is generated as follows:
x(k)= pi(M)+i
M = M+j
(1)
where, x(k) represents the selected number, M is the key used (K1, K2, K3, K4, K5), pi(M) is Mth
position of real part of π and i & j are the variable loop parameters. This makes the selections
more random and unpredictable. The randomness obtained by this pseudo random generator is
very good and proves resistant to most of the attacks.
3. NON BLIND EMBEDDING ALGORITHM
The sign (p x q binary image) is embedded into the logo (m x n grayscale image) as follows:
Firstly the original logo is divided into various subblocks and pxq subblocks are chosen pseudo-
randomly for embedding each bit of the sign. Each subblock is decomposed into single level of
DWT.
For any ith
subblock Si, all the wavelet coefficients of LH and HL subbands are raised or lowered
by a value K depending on the bit sign(i).
If sign(i)=0
then Ci(x,y)= Ci(x,y) – Ki
(2)
Else if sign(i)=1
Then Ci(x,y)=Ci(x,y)+Ki
(3)
Where Ci(x,y) refers to the wavelet coefficients of Si and (x,y) corresponds to the coordinates of
the wavelet coefficients of the LH and HL subbands in Si.
The image dependent parameter Ki is derived from the standard deviation of the second level mid-
frequency coefficients of the cover image. Ki is also suitably quantized in the range of wavelet
coefficients Ci. IDWT is applied to all the subblocks resulting in the signed logo. This signed
logo is used as the watermark for the blind embedding process.
4. BLIND EMBEDDING ALGORITHM
This algorithm makes use of the concept of thresholding. The watermark (Wm) is a m x n image
and the cover image (Im) is of size k x k. The proposed algorithm uses the standard deviation of
the sub-blocks to determine the threshold levels. There are 256 different threshold levels to
uniquely distinguish each pixel of the grayscale watermark (8-bit resolution). The block diagram
for the above process is shown in Fig. 1.
The pseudo random generator is used to linearize the watermark into a mn x 1 pseudo-random
sequence (Lw) using the keys K1, K2. The LH and HL subbands of Im are used for embedding
Wm. A total of mn subblocks are chosen pseudo-randomly from LH and HL subbands using the
key K5.
4. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
36
Encoding is done using the keys K3, K4 to determine the embedding location (EM, a 2D array)
within each of the selected subblocks.
For any ith subblock
∑
∈
−
=
i
S
y
x
i y
x
C
M
i
mean
)
,
(
)
,
(
1
1
)
(
(4)
{ }
∑
∈
−
−
=
i
S
y
x
i i
mean
y
x
C
M
i
std
)
,
(
2
)
(
)
,
(
1
1
)
(
(5)
Where the index i varies from 1 to pq and indicates the subblock number; M is the total size of
each subblock; Si refers to ith subblock; Ci(x,y) is the DWT coefficient of the location (x,y)
within the ith subblock. For ith subblock, the mean and standard deviation (std) are calculated
using only (M-1) locations (i.e. excluding the embedding location EMi(x,y)).
For finding the different threshold levels the following formula has been defined:
Th(j) = A*std(i)+B*j
(6)
Where j is the running index which decides the 256 unique threshold values and A, B are secret
keys. Based on the value of Lw(i), a value is assigned to EMi (x,y) depending on the value of the
corresponding threshold Th(i). A parameter Q is used for quantization as shown:
i
M
E ′ (x,y) = EMi (x,y)/Q where i
M
E ′ (x,y) is the new value assigned to EMi(x,y).
(7)
By following the above procedure Wm can be uniformly embedded into the LH and HL
subbands. Finally, the IDWT is taken which results in the watermarked image.
5. WATERMARK EXTRACTION
In this section we discuss the extraction procedure of the signed logo in stage 1 followed by the
sign in stage 2.
5.1 Stage 1
The watermark extraction is reverse of the embedding procedure. After extracting the wavelet
coefficient C*i(x,y) is scaled back using the quantization factor Q. This is used to determine the
ith value of the extracted pseudo-randomly linearized watermark (WM) as shown below:
Ci(x,y) = (C*i(x,y))*Q
const
j
th
y
x
C
if
j
i
WM i ±
∈
= )
(
)
,
(
)
(
(8)
where const is the predetermined tolerance value which depends on the parameters A and B.
Finally the watermark (Wm*) is recovered from the above pseudo-random linear array (WM)
using the same keys K1, K2. In some cases, the extracted coefficient may not correspond to any
of the 256 thresholds calculated. This might be due to any intentional/unintentional attack on the
watermarked image. In such cases the lost watermark pixels can be reconstructed with the help of
the recovered neighboring pixel values. In this technique the neighboring pixel values are
averaged to generate the lost value. Thus if a smooth grayscale watermark is chosen, it improves
the efficiency of the watermark extraction even during attacks.
5. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
37
Figure 1. Block diagram to embed and extract watermark
5.2 Stage 2
From the signed logo which is obtained from stage 1 the sign is extracted using the original logo
as follows:
The original logo and the extracted logo are divided into sub blocks and transformation is taken
as explained in the embedding procedure. The sum of the mid-frequency coefficients of each
corresponding sub block is then compared and based on their difference the sign bit is determined
as follows.
If Sum(j) > Sum*(j) then the embedded bit
sign(j) = 0
else if Sum(j)< Sum*(j) then
sign(j) = 1
where j refers to the sub block index and Sum and Sum* denote the sum of all the wavelet
coefficients in the LH and HL sub bands of jth
sub block in original and signed logo respectively.
During the process of watermark embedding and extracting, the initial seeds to the pseudo-
random generator (K1, K2) <applied to Wm>, K5 <to select different sub blocks> and (K3, K4)
<to determine the embedding location within each sub block> are used as secret keys. The
parameters A, B, Q together with the watermark size and the above mentioned initial seeds can be
used as secret keys. It is impossible to extract the watermark without these secret keys.
Furthermore the original logo can be made available only to authorized receivers who will be able
to extract the sign.
6. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
38
6. EXPERIMENTAL RESULTS
The cover/host image used is 512x512 grayscale 'Lena' and the logo is a 64x64 grayscale image
of 'Einstein'. The sign is a 16x16 binary image having the letters 'D I I A' on it. The various keys
used for testing were K1=11, K2=21, K3=31, K4=41, K5=51, A=250, B=2.5 and Q=4800. The
cover image which is watermarked with the signed-logo, is subjected to attacks like cropping,
rotation, JPEG compression, scaling and noising. For each type of attack the results are computed
for the maximum extent that can be tolerated. The metric used for evaluating the quality of
extracted watermark and watermarked image is PSNR (Peak Signal to Noise Ratio).
−
=
=
∑∑
= =
q
n
p
m
n
m
f
n
m
f
pq
MSE
MSE
n
PSNR
1 1
2
*
2
)
,
(
)
,
(
1
log
*
10
(9)
Where pq is the size of two images f and f* whose PSNR is to be determined and n is taken to be
256.
From the results in Table I-VI, we observe that this watermarking scheme is robust to
compression and other common image processing operations like cropping, rotation, scaling and
noising. We also evaluate the quality by computing their corresponding Correlation Factor, which
is given by,
∑
∑
∑
=
=
=
=
N
i
i
N
i
i
N
i
i
i
w
w
w
w
w
w
1
2
1
2
1
ˆ
ˆ
)
ˆ
,
(
ρ
(10)
where w is the original image and ŵ is the extracted image. N is the total number of pixels
present in the image. Correlation Factor takes values between 0 & 1. A Correlation factor of 0.75
or more is acceptable [13].
Fig. 2 shows the result of the proposed technique without any attack. The extracted cover image
and sign have good PSNR & the watermark is imperceptible in the watermarked image.
Figure 2. PSNR values of the cover image, extracted watermark and the sign
7. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
39
A comparative analysis is done between the proposed technique and a multi-watermarking
technique suggested in [14]. This has been chosen as reference as it gives the results for various
attacks and is robust. Comparison of the Correlation Factors of the watermark (signed-logo)
extracted from the attacked watermarked cover image is done for various attacks as shown in
Table IV-VIII and Fig. 3-7.
Table 1. Watermarked image under Gaussian Noise attack
Table 2. Watermarked image under salt and pepper Noise attack
Table 3. Watermarked image under speckle noise attack
8. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
40
Table 4. Watermarked image under cropping attack
Table 5. Watermarked image under jpeg compression attack
Table 6. Watermarked image under rotation attack
9. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
41
Table 7. Watermarked image under scaling attack
Figure 3. Comparison under compression attack
10. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
42
Figure 4.Comparison under cropping attack
Figure 5.Comparison under rotationg attack
Figure 6. Comparison under scaling attack
11. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
43
7. CONCLUSION
In this paper a new DWT based watermarking scheme is proposed which makes use of both blind
and non-blind algorithms. The highlight of the algorithm is that besides protecting the copyright
of the host image it also protects the watermark from any misuse. Since the embedding process
uses data from the source image as well, the extraction of watermark by an unauthorized person is
not possible. It thus serves the twin purpose of providing copyright protection to the watermark
and increasing the security of the whole process. For this purpose a new pseudo random generator
based on the mathematical constant π has been developed and used successfully at various stages
in the algorithm. The new concept of applying pseudo randomness in selecting the watermark
pixels makes the process more resistant to attacks. In the proposed technique the randomness is
also incorporated in selecting the location to embed the watermark. The watermarked image was
tested under various attacks and the results show that the proposed technique is better than the
contemporary techniques. Also the dependency of the watermark on the cover image makes the
technique resistant to copy attacks. Results show that the method is resistant to most of the
commonly occurring attacks.
The proposed technique can be made more robust by introducing the concept of Fuzzy Logic,
Adaptive Fuzzy Logic or Neural Networks. In this method, fuzzy Logic can be used instead of
pseudo-random approach, in the selection of the subblocks, where the watermark pixels are to be
embedded.
REFERENCES
[1] C I Podilbuk and E. J. Delp, (2001) “Digital watermarking: Algorithms and applications”, IEEE
Signal Processing Magazine, Vol. 18, No.4, pp33-46.
[2] Darko Kirovski, Henrique S. Malvar and Yacov Yacobi,( 2002) “Multimedia Content Screening
using a Dual Watermarking and Fingerprinting System”, Proceedings of the tenth ACM
international conference on Multimedia, pp.372 – 381.
[3] Sung Jin Lim, Hae Min Moon, Seung-Hoon Chae, Sung Bum Pan, Yongwha Chung and Min Hyuk
Chang, (2008), “Dual Watermarking Method for Integrity of Medical Images”, Second
International Conference on Future Generation Communication and Networking, IEEE Computer
Society, pp. 70-73.
[4] Mingyi Jiang. Giiopiiig Xo, Dongfeiig Yuan, (2004) “A Novel Blind Watermarking Algorithm Based
on Multiband Wavelet Transform”, Proceedings of ICSP, pp. 857-860.
[5] Saraju P.Mohanty, K.R. Ramakrishnan and Mohan Kankanhalli,(1999) “A Dual Watermarking
Technique for Images”, Proceedings of the 7th ACM International Multimedia Conference, pp.
49-51.
[6] Maha Sharkas, Dahlia ElShafie, and Nadder Hamdy, (2005) “A Dual Digital-Image Watermarking
Technique”, World Academy of Science, Engineering and Technology 5, pp. 136-139.
[7] Mathias Schlauweg, Dima Pröfrock, Benedikt Zeibich and Erika Müller, (2006) “Dual
Watermarking for Protection of Rightful Ownership and Secure Image Authentication”, MCPS'06,
Santa Barbara, California, USA, pp. 59-66, October.
[8] R.Dhanalakshmi, K.Thaiyalnayaki, (2010) “Dual Watermarking Scheme with Encryption”, (IJCSIS)
International Journal of Computer Science and Information Security, Vol. 7, No. 1, pp. 248-253.
[9] A. Miyazaki, A. Okamoto. (2002) “Analysis of watermarking systems in the frequency domain and
its application to design of robust watermarking systems”, IEICE Trans., Vol E85, No 1, pp.117-
124.
12. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
44
[10] P. Meerwald and A. UhI, (2001) “A Survey of wavelet-Domain watermarking Algorithms”,
Proceedings of SPlE Security and Watermarking of multimedia Content 111, San
Jose.CA,Vol.4314, pp. 505-516.
[11] Zhang Guannan, Wang Shuxun and Nian Guijun, (2004) “A Blind Watermarking Algorithm Based
on DWT
Color Image”, Intl. Symposium on Multi-Dimensional Mobile Communications, Vol. 2,pp. 634-
638.
[12] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, (1997) “Handbook of applied
cryptography”, CRC Press LLC, ISBN 0-8493-8523-7, pp.169-190.
[13] Ali Al-Haj, (2007) “Combined DWT-DCT Digital Image Processing”, Journal of Computer
Sciencs, Science Publications.
[14] S.M. Mohidul Islam, Rameshwar Debnath, S.K. Alamgir Hossain, (2007) “DWT Based Digital
Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG Compression,
Cropping and Multiple Watermarking,” ICICT.
[15] Peining Tao, Ahmet M. Eskicioglu, (2004) “A Robust Multiple Watermarking scheme in Discrete
Wavelet Transform domain”, Optics East.
[16] Maha Sharkas, Dahlia ElShafie, Nadder Hamdy, (2005) “A Dual Digital-Image Watermarking
Technique”, World Academy of Science, Engineering and Technology.
[17] R Dhanalakshmi, K Thaiyalnayaki, (2010) “Dual Watermarking Scheme with Encryption”,
International Journal of Computer Science and Information Security, Vol. 7, No. 1.
[18] Saeed K Amirgholipour, Ahmad R. Naghsh-Nilchi, (2009) “Robust Digital Image Watermarking
based on joint DWT-DCT”, International Journal of Digital Content Technology and its
Applications, Vol. 3, No. 2.
[19] V. Santhi, Dr. Arunkumar Thangavelu, (2009) “DWT-SVD combined Full Band Robust
Watermarking Technique for color Images in YUV color space”, International Journal of
Computer Theory and Engineering.
[20] Wei Xia, Hongwei Lu, Yizhu Zhao, (2010) “A Dual Binary Image Watermarking Based on Wavelet
Domain and Pixel Distribution Features”, Springer-Verlag Berlin Heidelberg.
[21] Pankaj U Lande, Sanjay N. Tablar, G.N. Shinde, (2010) “A Fuzzy logic approach to encrypted
Watermarking for still Images in Wavelet domain on FPGA”, International Journal of Signal
Processing, Image Processing and Pattern Recognition.
[22] Hung-H. Tsai, Chi-C. Liu, Kuo-C. Wang, (2007) “Blind Wavelet-based Image Watermarking based
on HVS and Neural Networks”.
Dr. Shikha Tripathi joined Amrita Vishwa Vidyapeetham, School of Engineering,
Bangalore campus in July 2009. Currently, she is serving as Associate professor & Vice-Chair, Dept. of
Electronics and Communication Engineering. Prior to this she was working as Group leader (Head),
Electronics & Instrumentation Group at BITS Pilani. She was at BITS, Pilani from January 1998 to July
2009. Prior to joining BITS, Pilani, she was in Tata Consultancy Services, Mumbai as Assistant System
13. Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
45
Analyst during Sept 1992 and Aug 1993 and Faculty Member, Department of Electronics &
Communication Engineering, Bangalore University during Jan 1994 to Dec 1997.
Her research interests include Image Compression, image watermarking, Digital Signal/image Processing,
document image processing, reconfigurable architectures for Software Defined Radio (SDR) and skew
estimation techniques in document images. Currently she is working on speaker/face recognition
techniques.
Nishanth Ramesh was born on May 31, 1988 in Mysore District in India. He attained
Bachelor of Technology in Electronics and Communication Engineering from Amrita Vishwa
Vidyapeetam, Amrita University-Bangalore in 2010. Presently he is working as ‘Programmer Analyst
Trainee’ in ‘Cognizant Technology Solutions’, Coimbatore. His research interests are Signal Processing,
Image Processing, Digital Watermarking.
Bernito A was born on July 29, 1988 in Kanyakumari district in India. He attained
his Bachelor of Technology in Electronics and Communication from Amrita University, Bengaluru in
2010. Presently he is pursuing his Master of Technology in Remote Sensing in Anna University of
Technology, Tirunelveli.
His areas of interest are Digital Image Processing, Digital Image Watermarking, Interpretation of satellite
images and Hyperspectral Imaging.
Neeraj Kannoth Jayraj was born on January 13, 1989 in Kasargode(Dt), Kerala. He
did his schooling in Chinmaya Vidyalaya. Trissur. He completed Bachelor of Technology in Electronics
and Communication from Amrita University, Bengaluru in 2010. Currently he is working in ‘Cognizant
Technology Solutions’, Bengaluru as ‘Programmer Analyst Trainee’.